zz: Cylab
While Trusted Computing is the most visible aspect of this research area, we show that
many of the techniques used by Trusted Computing date back to the 1980s [66]. ese ideas
thus extend beyond Trusted Computing’s TPM to the general concept of bootstrapping trust
in commodity computers. is fact becomes all the more relevant as cellphones emerge as
the next major computing platform (as of 2005, the number of cellphones worldwide was
about double the number of personal computers [80, 207]). In fact, many cellphones already
incorporate stronger hardware support for security than many desktop computers and use
some of the techniques described in this chapter [14, 16]. Indeed, as CPU transistor counts
continue to climb, CPU vendors are increasingly willing to provide hardware support for
secure systems (see, for example, Intel and AMD’s support for virtualization [3, 95], and
Intel’s new AES instructions, which provide greater eciency and resistance to side-channel
attacks [81]). us, research in this area can truly guide the development of new hardware
supported security features.
阅读(1020) | 评论(0) | 转发(0) |